bg_image
يبدأ التسجيل:
07 July 2026
معلومات عامة
المدرب / المدربون
عدد الساعات التدريبية
35
فترة الإنعقاد
2026-08-09 - 2026-08-25
أيام النشاط التدريبي
Sunday
التوقيت
17:00 - 20:00
لغة النشاط التدريبي
إنجليزي
المنهجية
مدمج
نوع التدريب
الشهادات المهنية
آخر موعد للتسجيل
Thursday, 6 August 2026, 5:00 PM
السعر للأردني
400JOD
السعر لغير الأردني
563US$
الوصف العام

CISM (Certified Information Security Manager) is a certification awarded by ISACA to IT professionals who demonstrate expertise in information security governance, program development & management, incident management, and risk management.
The CISM is a management-focused certification that promotes global information security procedures and recognizes professionals' abilities to manage, supervise, and assess an organization's information security. The certification is designed for those who manage cybersecurity teams and those who want to lead security teams.

المخرجات

1.    Understand the roles & responsibilities of a Certified Information Security Manager and how to properly manage a security program.
2.    Learn about current security management standards and best practices for Information Security.
3.    Establish effective security policies, programs and procedures.
4.    Develop the skills to create and implement an information security strategy, risk management program and security audit process.
5.    Identify, evaluate and mitigate threats to an organization's IT infrastructure, applications and data.
6.    Know how to ensure that all internal and external stakeholders are compliant with security policies and processes.
7.    Gain expertise in handling crisis management, incident response and disaster recovery.
8.    Understand the importance of effective communications to ensure awareness of the policies and procedures throughout an organization.

Course Video
المحتويات

Domain 1: Information Security Governance (17%)
A. Enterprise Governance
•    Organizational Culture
•    Legal, regulatory, and contractual requirements
•    Organizational structure, roles and responsibilities
B. Information Security Strategy
•    Information security strategy development
•    Information governance framework and standards
•    Strategic Planning (e.g., budgets, resources, business case)

Domain 2: Information Security Risk Management (20%)
A. Information Security Risk Assessment
•    Emerging Risk and Threat Landscape
•    Vulnerability and Control Deficiency Analysis
•    Risk Assessment and Analysis
B. Information Security Risk Response
•    Risk Treatment / Risk Response Options
•    Risk and Control Ownership
•    Risk Monitoring and Reporting

Domain 3: Information Security Program (33%)
A. Information Security Program Development
•    Information Security Program Resources (e.g., people, tools, technologies)
•    Information Asset Identification and Classification
•    Industry Standards and Frameworks for Information Security
•    Information Security Policies, Procedures, and Guidelines
•    Information Security Program Metrics
B. Information Security Program Management
•    Information Security Control Design and Selection
•    Information Security Control Implementation and Integrations
•    Information Security Control Testing and Evaluation
•    Information Security Awareness and Training
•    Vendor, supplier, third-party, and fourth-party management
•    Information Security Program Communications and Reporting

Domain 4: Incident Management (30%)
A. Incident Management Readiness
•    Incident Response Plan
•    Business Impact Analysis (BIA)
•    Business Continuity Plan (BCP)
•    Disaster Recovery Plan (DRP)
•    Incident Classification/Categorization
•    Incident Management Training, Testing, and Evaluation
B. Incident Management Operations
•    Incident Management Tools and Techniques
•    Incident Investigation and Evaluation
•    Incident Containment Methods
•    Incident Response Communications (e.g., reporting, notification, escalation)
•    Incident Eradication and Recovery
•    Post-incident Review Practices

الفئة المستهدفة

•    Security professionals and IT administrators advancing their skills in information security
•    IT professionals seeking comprehensive understanding of security risks and protection approaches
•    Individuals involved in security risk management and security controls
•    Professionals developing and evaluating security policies
•    Those working in information security or pursuing related degrees

HTML tutorial